talk-data.com talk-data.com

Topic

interest-security

202

tagged

Activity Trend

161 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: Google Cloud Next '25 ×

This session dives into the latest advancements in securing and managing your Cloud Run workloads at enterprise scale. Join us to learn about new features and techniques to meet the highest security standards, strategies for managing large-scale deployments, and solutions to common issues like IP exhaustion. Plus, one of our customers will share their firsthand experience managing a massive fleet of Cloud Run workloads.

In this session, we’ll explore how you can manage human and nonhuman identities on Google Cloud. We’ll discuss how these identities are defined, managed, and used to secure access to resources, and we’ll cover topics such as cryptographic managed workload identities, identity federation, and flexible identity onboarding options on Google Cloud.

Discover the power of Google Cloud instances running on the latest Intel Xeon processors. This course will introduce you to Intel’s optimization tools, designed to help you manage and optimize your infrastructure with unmatched efficiency and performance. Learn how to leverage these cutting-edge technologies to enhance your cloud computing capabilities and drive your business forward.​

This Session is hosted by a Google Cloud Next Sponsor.
Visit your registration profile at g.co/cloudnext to opt out of sharing your contact information with the sponsor hosting this session.

Learn how LG AI Research uses Google Cloud AI Hypercomputer to build their EXAONE family of LLMs and innovative Agentic AI experiences based the models. EXAONE 3.5, class of bilingual models that can learn and understand both Korean and English, recorded world-class performance in Korean. The collaboration between LG AI Research and Google Cloud enabled LG to significantly enhance model performance, reduce inference time, and improve resource efficiency through Google Cloud's easy-to-use scalable infrastructure

In this hands-on lab, you’ll learn the fundamentals of networking in Google Cloud and how it differs from traditional on-premises setups. You'll build a network with three subnetworks and gain practical experience in creating firewall rules. Learn how to apply these rules using instance tags to control access across your environment. By the end of the session, you'll be equipped with the foundational knowledge to manage and secure Google Cloud networks effectively.

If you register for a Learning Center lab, please ensure that you sign up for a Google Cloud Skills Boost account for both your work domain and personal email address. You will need to authenticate your account as well (be sure to check your spam folder!). This will ensure you can arrive and access your labs quickly onsite. You can follow this link to sign up!

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

Often, cloud risks fly under the radar because organizations don’t know they have sensitive data lurking in their environment. This creates a treasure trove for attackers, particularly when it comes to high-value AI training data. In this talk, we’ll discuss how sensitive data discovery and content understanding can help reduce security and privacy risks, safeguard AI development and deployment, and drive business momentum – especially in analytics and AI.

As a cloud security professional, you are responsible for protecting your valuable cloud data. This technical session demonstrates how Security Command Center can help you automatically discover your cloud data assets, pinpoint which datasets may be at risk, define and implement the right posture controls to protect data and manage access, and provide your team with real-time alerting of data security violations. Get ready to prevent breaches, reduce insider risk, and meet compliance requirements.

Learn how Chrome Enterprise Premium can help you stay ahead of the curve in today’s ever-evolving threat landscape. In this session, we’ll dive deep into new browser-based capabilities, such as proactive data loss prevention with advanced data masking, enhanced employee phishing protection, and scaled threat prevention with Google Threat Intelligence.

session
by Rahul Gupta (Google Cloud) , Mansi Bakshi (Google Cloud) , Vaishali Someshwar (Ericsson On-Demand Network Services) , David Schott (Snyk)

Even if your cloud infrastructure is configured securely, how can you make sure cloud applications do not introduce vulnerabilities? This technical session for cloud security professionals focuses on shift-left security practices, including the latest strategies for building secure applications, achieving code-to-cloud traceability of code-related issues, and getting AI-generated remediations that make it easy for application development teams to fix issues at the source.

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.

Test your incident response skills in the Security Tabletop Workshop, an exercise that simulates a realistic cyberattack to assess and improve an organization’s security posture. Tabletop exercises are a critical component of any cybersecurity strategy, helping your team reduce the impact of cyberattacks, evaluate response strategies, address gaps, foster collaboration, and clarify roles during a crisis.

Experience what a real cyberattack is like in ThreatSpace, a digital training ground on Google Cloud. While the Mandiant red team tries to break into your system, the Mandiant incident response team guides you through the investigation. Use Google Security Operations and Threat Intelligence tools to uncover how the attackers got in and what they’ve done. Extra points if you can catch the bad guys!

Take part in the new SOC Experience – a view into real-world attack scenarios. Learn about the latest hacker tactics and how Google equips cybersecurity teams with the data, AI, and scalable analytics to detect and remediate attacks.

Google Threat Intelligence’s Capture the Flag game uses real-world data, including Cybersecurity & Infrastructure Security Agency (CISA) advisories, ransom notes, and information from the dark web, to simulate a threat hunt. Test your cybersecurity skills by navigating clues, analyzing evidence, and solving puzzles to capture the flags with Google Threat Intelligence.